>
“At that point the victim signed onto another computer and used the “Back to My Mac” program to determine that her stolen MacIntosh laptop was on the Web.”
Advertisements
>
“At that point the victim signed onto another computer and used the “Back to My Mac” program to determine that her stolen MacIntosh laptop was on the Web.”